CA2860990C - Systeme et procede d'acces legal a des communications securisees - Google Patents
Systeme et procede d'acces legal a des communications securisees Download PDFInfo
- Publication number
- CA2860990C CA2860990C CA2860990A CA2860990A CA2860990C CA 2860990 C CA2860990 C CA 2860990C CA 2860990 A CA2860990 A CA 2860990A CA 2860990 A CA2860990 A CA 2860990A CA 2860990 C CA2860990 C CA 2860990C
- Authority
- CA
- Canada
- Prior art keywords
- kms
- randri
- initiator
- responder
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 78
- 238000000034 method Methods 0.000 title claims abstract description 55
- 239000003999 initiator Substances 0.000 claims abstract description 105
- 238000010586 diagram Methods 0.000 description 24
- 230000006870 function Effects 0.000 description 21
- 150000003839 salts Chemical class 0.000 description 10
- 238000013459 approach Methods 0.000 description 9
- 238000011069 regeneration method Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 8
- 230000008929 regeneration Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 239000003607 modifier Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- AILFSZXBRNLVHY-UHFFFAOYSA-N 2,5-Dimethyl-4-ethoxy-3(2H)-furanone Chemical compound CCOC1=C(C)OC(C)C1=O AILFSZXBRNLVHY-UHFFFAOYSA-N 0.000 description 2
- 230000003321 amplification Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 208000007367 Kabuki syndrome Diseases 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
La présente invention concerne des systèmes et des procédés pour des communications sécurisées. Selon certains aspects, un KMS initiateur reçoit, à partir d'un équipement utilisateur (UE) initiateur, une ou plusieurs valeurs utilisées dans la génération d'une clé de chiffrement, ce qui consiste à obtenir au moins une valeur associée à un RANDRi. Le KMS initiateur envoie la ou les valeurs associées au RANDRi à un KMS répondant. Le KMS répondant génère la clé de chiffrement à l'aide de la ou des valeurs.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261586068P | 2012-01-12 | 2012-01-12 | |
US61/586,068 | 2012-01-12 | ||
US201261622869P | 2012-04-11 | 2012-04-11 | |
US61/622,869 | 2012-04-11 | ||
PCT/CA2013/050015 WO2013104072A1 (fr) | 2012-01-12 | 2013-01-11 | Système et procédé d'accès légal à des communications sécurisées |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2860990A1 CA2860990A1 (fr) | 2013-07-18 |
CA2860990C true CA2860990C (fr) | 2020-06-16 |
Family
ID=48779969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2860990A Active CA2860990C (fr) | 2012-01-12 | 2013-01-11 | Systeme et procede d'acces legal a des communications securisees |
Country Status (4)
Country | Link |
---|---|
US (1) | US9264227B2 (fr) |
EP (1) | EP2803162B1 (fr) |
CA (1) | CA2860990C (fr) |
WO (1) | WO2013104072A1 (fr) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2860989C (fr) | 2012-01-12 | 2021-11-30 | Michael Eoin Buckley | Systeme et procede d'acces legal a des communications securisees |
US9148449B2 (en) | 2013-03-13 | 2015-09-29 | Authentify, Inc. | Efficient encryption, escrow and digital signatures |
US20150200972A1 (en) * | 2014-01-16 | 2015-07-16 | Qualcomm Incorporated | Methods and systems for facilitating decoding of application defined or proprietary protocols in lawful intercepts |
CN105847242A (zh) * | 2016-03-17 | 2016-08-10 | 北京佰才邦技术有限公司 | 基于本地卸载的数据侦听方法和装置 |
US10764335B2 (en) * | 2016-08-23 | 2020-09-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Lawful interception |
US11843675B2 (en) * | 2018-10-10 | 2023-12-12 | Nec Corporation | Method and system for synchronizing user identities |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7382881B2 (en) | 2001-12-07 | 2008-06-03 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful interception of end-to-end encrypted data traffic |
EP1735944A1 (fr) | 2004-03-18 | 2006-12-27 | Qualcomm, Incorporated | Transmission efficace d'informations cryptographiques dans un protocole en temps reel securise |
US7746853B2 (en) | 2004-08-16 | 2010-06-29 | Cisco Technology, Inc. | Method and apparatus for transporting broadcast video over a packet network including providing conditional access |
GB0517592D0 (en) * | 2005-08-25 | 2005-10-05 | Vodafone Plc | Data transmission |
US20070237144A1 (en) | 2006-03-30 | 2007-10-11 | Avaya Technology Llc | Transporting authentication information in RTP |
US8934609B2 (en) | 2006-06-21 | 2015-01-13 | Genband Us Llc | Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful intercept use |
WO2008013482A1 (fr) | 2006-07-26 | 2008-01-31 | Telefonaktiebolaget Lm Ericsson (Publ) | Interception légitime basée sur les services |
US7852783B2 (en) | 2006-12-07 | 2010-12-14 | Cisco Technology, Inc. | Identify a secure end-to-end voice call |
CN101232368B (zh) | 2007-01-23 | 2011-06-01 | 华为技术有限公司 | 一种分配媒体流密钥的方法和多媒体子系统 |
JP5012173B2 (ja) * | 2007-04-26 | 2012-08-29 | コニカミノルタホールディングス株式会社 | 暗号通信処理方法及び暗号通信処理装置 |
US8317498B2 (en) | 2007-05-11 | 2012-11-27 | Schlumberger Technology Corporation | Valve-seat interface architecture |
JPWO2009004732A1 (ja) | 2007-07-05 | 2010-08-26 | 日立ソフトウエアエンジニアリング株式会社 | 共有暗号ファイルの暗号化、復号処理方法 |
US7855982B2 (en) | 2007-11-19 | 2010-12-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
EP3079298B1 (fr) * | 2007-11-30 | 2018-03-21 | Telefonaktiebolaget LM Ericsson (publ) | Gestion de clé pour une communication sécurisée |
KR101514840B1 (ko) | 2008-06-11 | 2015-04-23 | 삼성전자주식회사 | 휴대 방송 시스템에서의 암호화 키 분배 방법 및 이를 위한시스템 |
WO2009152846A1 (fr) | 2008-06-16 | 2009-12-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Stockage et envoi de données multimédias |
US8792505B2 (en) | 2008-07-24 | 2014-07-29 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful interception for targets in a proxy mobile internet protocol network |
CN102204303B (zh) | 2008-11-05 | 2015-11-25 | 爱立信电话股份有限公司 | 用于在电路交换网络中利用ims数据安全机制的系统和方法 |
US8300603B2 (en) | 2008-11-17 | 2012-10-30 | Cisco Technology, Inc. | Location reporting in wireless networks |
US20100205448A1 (en) | 2009-02-11 | 2010-08-12 | Tolga Tarhan | Devices, systems and methods for secure verification of user identity |
US8370204B2 (en) | 2009-04-09 | 2013-02-05 | Cisco Technology, Inc. | Providing relevant advertisements and service in communication networks |
US8879547B2 (en) | 2009-06-02 | 2014-11-04 | Oracle International Corporation | Telephony application services |
US8850203B2 (en) * | 2009-08-28 | 2014-09-30 | Alcatel Lucent | Secure key management in multimedia communication system |
US8831014B2 (en) | 2009-09-26 | 2014-09-09 | Cisco Technology, Inc. | Providing services at a communication network edge |
CN102055747B (zh) | 2009-11-06 | 2014-09-10 | 中兴通讯股份有限公司 | 获取密钥管理服务器信息的方法、监听方法及系统、设备 |
US8588109B2 (en) | 2009-12-11 | 2013-11-19 | Verizon Patent And Licensing Inc. | Integrated lawful intercept for internet protocol multimedia subsystem (IMS) over evolved packet core (EPC) |
US8625787B2 (en) | 2010-01-14 | 2014-01-07 | Alcatel Lucent | Hierarchical key management for secure communications in multimedia communication system |
CN102223356B (zh) | 2010-04-19 | 2015-06-03 | 中兴通讯股份有限公司 | 基于密钥管理服务器的ims媒体安全的合法监听系统 |
CN103119976B (zh) | 2010-09-15 | 2016-11-02 | 瑞典爱立信有限公司 | 通信网络中经由中间单元发送受保护数据 |
MY161918A (en) | 2011-03-29 | 2017-05-15 | ERICSSON TELEFON AB L M (publ) | Lawful interception in an ip multimedia subsystem network |
US8644510B2 (en) * | 2011-05-11 | 2014-02-04 | Alcatel Lucent | Discovery of security associations for key management relying on public keys |
CA2860989C (fr) | 2012-01-12 | 2021-11-30 | Michael Eoin Buckley | Systeme et procede d'acces legal a des communications securisees |
CA2860866C (fr) | 2012-01-12 | 2020-06-23 | Blackberry Limited | Systeme et procede d'acces legal a des communications securisees |
-
2013
- 2013-01-11 EP EP13735922.0A patent/EP2803162B1/fr active Active
- 2013-01-11 US US13/739,671 patent/US9264227B2/en active Active
- 2013-01-11 CA CA2860990A patent/CA2860990C/fr active Active
- 2013-01-11 WO PCT/CA2013/050015 patent/WO2013104072A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP2803162A4 (fr) | 2015-09-23 |
CA2860990A1 (fr) | 2013-07-18 |
EP2803162B1 (fr) | 2020-04-15 |
US9264227B2 (en) | 2016-02-16 |
WO2013104072A1 (fr) | 2013-07-18 |
US20130182841A1 (en) | 2013-07-18 |
EP2803162A1 (fr) | 2014-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9871827B2 (en) | System and method of lawful access to secure communications | |
CA2860866C (fr) | Systeme et procede d'acces legal a des communications securisees | |
CA2860990C (fr) | Systeme et procede d'acces legal a des communications securisees | |
EP2813047B1 (fr) | Interception légale de communications chiffrées | |
WO2007023286A1 (fr) | Protection des communications | |
US8990563B2 (en) | Sending protected data in a communication network | |
CN102055585B (zh) | 基于密钥管理服务器的媒体安全合法监听方法及系统 | |
KR101488167B1 (ko) | 키관리 프로토콜을 보호하기 위해 대칭 키를 제공하는 방법 | |
CN102223356B (zh) | 基于密钥管理服务器的ims媒体安全的合法监听系统 | |
CN107431731B (zh) | 用于通信的拦截的方法及装置 | |
RU2358406C2 (ru) | Аутентификация и актуализация генераций ключей сеанса между предоставляющим услуги сетевым узлом и, по меньшей мере, одним коммуникационным оконечным устройством с идентификационной картой | |
US20240097903A1 (en) | Ipcon mcdata session establishment method | |
GB2390270A (en) | Escrowing with an authority only part of the information required to reconstruct a decryption key | |
Rehman | Investigation of Interworked IMS Architecture In Terms Of Traffic Security | |
Sinha | Analysis of VoIP Forensics with Digital Evidence Procedure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20171218 |